Boundary Inference for Enforcing Security Policies in Mobile Ambients.
Chiara BraghinAgostino CortesiRiccardo FocardiSteffen van BakelPublished in: IFIP TCS (2002)
Keyphrases
- security policies
- access control
- security management
- security concerns
- distributed systems
- network security
- mobile devices
- mobile phone
- security requirements
- cyber attacks
- bayesian networks
- access control systems
- context aware
- home network
- mobile computing
- mobile applications
- intelligent agents
- distributed environment
- computing environments
- fine grained
- mobile networks